I guess that once you own the instance (be it via an initial SQL injection flaw or any other means) you can go on a rampage. Crypto mining is just one of the possibilities, but it's the one being discussed in the article.
I guess that once you own the instance (be it via an initial SQL injection flaw or any other means) you can go on a rampage. Crypto mining is just one of the possibilities, but it's the one being discussed in the article.